POPULARITY
When you feel the energy of RSAC week starting to build, you know it's going to be a memorable one. Conversations, collaborations, learning, connecting—it's what this community thrives on. And ahead of the big week, we had a chance to catch up with Sterling Wilson, Field CTO at Object First, to talk about their vision for data resilience and why backup security can't be an afterthought anymore.Sterling's career path reads like a masterclass in data protection. After working deep in the trenches as a Microsoft and virtualization architect for both government and private sectors, he transitioned into the vendor space—eventually joining Veeam Software, where he became immersed in the world of backups and data resilience. That journey eventually brought him to Object First, and it's clear that passion for simplifying security while strengthening infrastructure hasn't faded.One of the major shifts we talked about is how the world of cybersecurity is now fundamentally interconnected. Sterling emphasized what we've said many times ourselves: it's no longer about isolated tools or technologies. It's about how everything fits together. And at the center of it all? Data.Object First is hitting RSAC with a mission: making backup security radically simple without compromising strength. Their “Ootbi”—short for Out Of The Box Immutability—makes protecting backup data straightforward, automatic, and resilient. No special configuration needed. No extra security knowledge required. Just plug it in and let the design do the work.We loved hearing how Object First applies core Zero Trust principles—like assuming breach and strict segmentation—not to networks or apps, but directly to backup storage. It's a philosophy Sterling calls “Zero Trust Data Resilience.” Especially in a world where admins are juggling multiple roles, budgets are tighter, and attacks are getting smarter (yes, AI is helping the bad actors too), reducing complexity while increasing protection is a game-changer.Sterling also shared a hard truth that many organizations are realizing too late: a lot of backup storage solutions weren't built for today's threat landscape. They weren't designed with security-first thinking. Object First aims to fix that by focusing on simplicity, immutability, and speed—not just in backup, but in recovery when it matters most.If you're heading to RSAC 2025, make sure you swing by Booth S260 to check out Object First in person. There'll be demos, trivia, swag, and a few surprise announcements. Plus, Sterling will be speaking at the Insights Theater (South Expo Booth 2151) on April 30 at 10:30 AM. He'll dive deeper into what Zero Trust Data Resilience really means—and why it's time to rethink how we secure our most valuable digital assets.And if you can't make it to San Francisco? Don't worry—we'll be recording another conversation with Sterling on location during the conference, going even deeper into these critical topics. Be sure to follow our On Location coverage to stay connected with everything happening during RSAC 2025.The future of security isn't just about new firewalls, AI-driven analytics, or policy updates. It's about protecting what matters most—our data—with approaches that are built for the challenges of today, not yesterday. And with companies like Object First pushing the boundaries, we think the conversation around data resilience is about to get a whole lot louder.Guests:Sterling Wilson | Field CTO | Data Resilience Strategist | ZTDR AdvocateLinkedIn: https://www.linkedin.com/in/sterling-wilson-007______________________________Resources:Learn more about Object First: https://itspm.ag/object-first-2gjlLearn more and catch more stories from Object First: https://www.itspmagazine.com/directory/object-firstImmutable Storage for Everyone.Ransomware-proof and immutable out-of-the-box, Ootbi delivers secure, simple, and powerful backup storage: https://itspm.ag/objectzlju____________________________Keywords:RSAC 2025, backup security, data resilience, immutable storage, zero trust, object first, ootbi, zero trust data resilience, cybersecurity conference, backup protection, Veeam, ransomware, disaster recovery, storage security, simple cybersecurity, RSAC, securing backups, infosec, infosecurity_______________________Learn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Cameras and gates and wasp spray, oh my! Yes, these are all great ways to keep the trash off your property and to give your security a boost. Security is top of mind for most self storage tenants. It consistently ranks in the top 3 for what is most important to our customers. What security do you need for your facility? Do you really need a gate? What about cameras and lighting? From locks to access hours, good managers to AI, cameras to wasp spray, we cover a ton as we break down what it takes to keep the trashy people off your self storage property. Plus, some bonus content towards the end as we approach the end of the year. Hosts: Josh Huff & Melissa Huff Produced by Lighthouse Storage Solutions
Tangem hardware wallets are must-haves for anyone serious about crypto security. Once you know which one to go for, The Crypto Merchant has you covered. Click https://www.thecryptomerchant.com/collections/tangem-wallet now! The Crypto Merchant City: Daytona Beach Address: 609 South Ridgewood Avenue Website: https://www.thecryptomerchant.com/
Today, my guest is Reza Raji. Reza is the Senior Vice President of Vantiva, Smart Spaces, Internet of Things, division with a rich history of driving IoT innovation. Reza has transformed industries from smart homes to commercial enterprises. And in just a minute, we're going to speak with Reza about applications for Vantivas, new Smart Security camera, the Vantiva Peek, how it works and its applications.
Get ready for one of our most entertaining podcasts of the year. Aaron Harwell from SpiderDoor joins Tommy and Melissa to talk about self storage security. Aaron has experience both as a self storage owner and the owner of a self storage security company and talks about what has (and hasn't) worked for his facilities and what led him to the many unique solutions SpiderDoor provides. From lasers, to attack dogs, to gates, and just about everything in between, we hit on all the security you should look into for your facilities. Plus, Aaron reveals his top 2 must have security features every facility needs to be using today. Hosts: Tommy Nguyen & Melissa Huff Guest: Aaron Harwell with SpiderDoor Brought to you by the teams at StoragePug and Lighthouse Storage Solutions
In this episode, Business Ninja Andrew is joined by Nick Ryan, Vice-President of Marketing at Calamu Technologies Corporation, to talk about cybersecurity software.Calamu Protect™ is an innovative data protection technology that turns data into valueless fragments and scatters them to multiple storage locations automatically. Data is instantly reassembled when called for by an authorized application or user – and in the event of a cyber attack, Calamu's patented self-healing technology mitigates any impact by reconstituting data to its original and uncorrupted condition. Using the intuitive SaaS console, combine your preferred storage locations or cloud providers into a safe #dataharbor, a virtually air-tight environment for data backups, mission-critical application data, or end user files. Visit Calamu.com/get-started today for live demo.-----Do you want to be interviewed for your business? Schedule time with us, and we'll create a podcast like this for your business: https://www.WriteForMe.io/-----https://www.facebook.com/writeforme.iohttps://www.instagram.com/writeforme.io/https://twitter.com/writeformeiohttps://www.linkedin.com/company/writeforme/ https://www.pinterest.com/andysteuer/Want to be interviewed on our Business Ninjas podcast? Schedule time with us now, and we'll make it happen right away! Check out WriteForMe, more than just a Content Agency! See the Faces Behind The Voices on our YouTube Channel!
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Amit. Thank you for watching this video, For more details or free demo with our expert write into us at sales@infosectrain.com ➡️ Agenda for the Webinar
Cloud infrastructure is highly sought after today and widely considered the next step in data management. However, like any software solution, it comes with vulnerabilities. Veritas is on the cusp of bringing cybersecurity solutions to businesses of all sizes and strives to fill the gaps in cloud storage protection. Shelby Skrhak speaks with Jeremy Snow, system engineer at Veritas, about: Why cloud data is challenging to protect Fallacies about cloud data storage What Veritas brings to the table To join the discussion, follow us on Twitter @IngramTechSol #B2BTechTalk Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify,Apple Podcasts or Stitcher. Or tune in on our website.
Jonathan, the person who works with me on providing the content I produce supporting small investors getting in, or growing their self storage business, suggested I consider writing something on security options for people building or rehabbing a facility. It always seems like a boring subject to me, but in every Bootcamp, he reminded me there are a lot of questions on it. He is right. I seem to be wanting to focus on the bigger picture, and participants want to be in the weeds asking specific questions, like about security options. So, let's discuss some security options and our relationship to them. Video Link: https://www.youtube.com/watch?v=VJSCtHaNtH4 -My Training and Coaching at https://TheQuickStartAcademy.com/ -Listen on Apple Podcasts - https://podcasts.apple.com/us/podcast/creating-wealth-through-self-storage/id1588425875 -5 KPIs we measure and how we do it: https://creatingwealththroughselfstorage.lpages.co/top-5-kpi-ebook/ -My blog: http://creatingwealththroughselfstorage.com/ -Facebook: https://www.facebook.com/markhelmselfstorage/ -Twitter: https://twitter.com/MarkHelmSelfst -The Storage World Analyzer: http://storageworldanalyzer.com/ -The QuickStart Academy Store: https://quick-start-academy.myshopify.com
Doron Pinhaus, CTO of Continuity Software discusses some of the ramifications of hackers gaining control of your storage system, interesting findings from the NIST Guide for Storage Security, and the best way for listeners to be prepared for a cyberattack.
In this episode of TechChat we start our 4 part re:Invent 2020 series with this episode covering all ‘Security’, ‘Network’, ‘Compute’ and ‘Storage’ announcements. We started reviewing security announcements * AWS Security Hub (https://aws.amazon.com/security-hub/) can now automatically receive findings from the Kube-bench (https://github.com/aquasecurity/kube-bench). * AWS Audit Manager is a new service that helps you continuously audit your AWS usage and automates evidence collection to make it easier for you to assess whether your policies, procedures, and activities are operating effectively. * CloudTrail provides more granular control of data event logging through advanced event selectors Before pivoting to Network updates * AWS Transit Gateway Inter-region Peering is Now Available in additional regions which provides you more choice in how you architect your network and software stack. * AWS Transit Gateway Connect brings SD-WAN connectivity to your VPC * AWS Global Accelerator launches custom routing allowing you to route multiple users to a specific EC2 destination in a single or multiple AWS Regions by directing them to a unique port on your accelerator * VPC Reachability Analyzer is here to simplify connectivity testing and troubleshooting, a great win for customers Compute brings a raft of new instance and instance types * EC2 Mac instances for macOS * New instance types (M5zn high frequency and 100Gbps | D3 and D3en, the next generation of dense HDD storage instances | R5b instances featuring 60 Gbps of EBS Bandwidth and 260K IOPS | G4ad instances, powered by AMD Radeon Pro V520 GPUs) * Local Zones in Boston, Houston, and Miami * AWS Managed Services supports AWS Outposts * Amazon Machine Images now support tag-on-create and tag-based access control And finally to round out the show we discussed storage * New EBS general purpose volumes, gp3 * EBS io2 volumes now support SAP workloads * Tiered pricing for input/output operations per second (IOPS) charges for Amazon Elastic Block Store (EBS) io2 volume, reducing the cost of provisioning peak IOPS by 15% * quadruples per-volume maximum capacity and performance on io2 volume * S3 Replication adds support for two-way replication * S3 Bucket Keys reduce the costs of Server-Side Encryption with AWS Key Management Service * S3 now delivers strong read-after-write consistency automatically for all applications * S3 Replication adds support for multiple destinations in the same, or different AWS Regions Stay tuned as we cover all aspects of re:invent 2020 in our coming multi-part re:Invent update Speakers: Shane Baldacchino - Edge Specialist Solutions Architect, ANZ, AWS Shai Perednik - Solutions Architect, AWS
Joining us this week is Tricia Howard, Client Manager, Optiv for a special RANTCAST on Security. About Optiv Optiv Security is a security solutions integrator that enables clients to reduce risk by taking a strategic approach to cybersecurity. Align your security program to achieve specific business outcomes with our full suite of service capabilities, from strategy to technology—and everything in between. Highlights: • Security Rant • Data Privacy and Rights / Data Security • Companies and Storage/Security of Personal Data • Data is a Currency • Securing Systems and Data Leakage • Password Re-Use and Lack of Re-Use Impact on Vendors / SIM Hacking • Monopoly Power of Big Tech Companies & Gov’t Regulation • Dark Web – What is it? • Identity on Internet • Perimeter Security
This week, Chris and Martin talk to Eran Brown, CTO in EMEA for INFINIDAT. As we move to a more distributed world, implementing data security becomes ever more challenging. Eran explains the issues and how his customers are looking to solve the problem. One of the initial choices is to decide exactly where to encrypt. […] The post #86 – Eran Brown Discusses Storage, Security & Multi-Cloud appeared first on Storage Unpacked Podcast.
Kevin Brown, vice president at Decru, a NetApp company, shares insights on embedded vs. appliance-based encryption options and best practices for choosing the right strategy for storage security, including implementing an integrated encryption approach to eliminate the complexity of multi-key management.
Kevin Brown, vice president of Decru, a NetApp company, discusses how the storage and security sectors have converged and what this convergence means for you and your data center. He shares his view into the future of storage security and how it will be a fundamental ingredient of data management.
Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference
Himanshu Dwivedi's presentation will discuss the severe security issues that exist in the default implementations of iSCSI storage networks/products. The presentation will cover iSCSI storage as it pertains to the basic principals of security, including enumeration, authentication, authorization, and availability. The presentation will contain a short overview of iSCSI for security architects and basic security principals for storage administrators. The presentation will continue into a deep discussion of iSCSI attacks that are capable of compromising large volumes of data from iSCSI storage products/networks. The iSCSI attacks section will also show how simple attacks can make the storage network unavailable, creating a devastating problem for networks, servers, and applications. The presenter will also follow-up each discussion of iSCSI attacks with a demonstration of large data compromise. iSCSI attacks will show how a large volume of data can be compromised or simply made unavailable for long periods of time without a single root or administrator password. The presentation will concluded with existing solutions from responsible vendors that can protect iSCSI storage networks/products. Each iSCSI attack/defense described by the presenter will contain deep discussions and visual demonstrations, which will allow the audience to fully understand the security issues with iSCSI as well as the standard defenses. Himanshu Dwivedi is a founding partner of iSEC Partners, LLC. a strategic security organization. Himanshu has 11 years experience in security and information technology. Before forming iSEC, Himanshu was the Technical Director for @stake's bay area practice, the leading provider for digital security services. His professional experiences includes application programming, infrastructure security, secure product design, and is highlighted with deep research and testing on storage security for the past 5 years. Himanshu has focused his security experience towards storage security, specializing in SAN and NAS security. His research includes iSCSI and Fibre Channel (FC) Storage Area Networks as well as IP Network Attached Storage. Himanshu has given numerous presentations and workshops regarding the security in SAN and NAS networks, including conferences such as BlackHat 2004, BlackHat 2003, Storage Networking World, Storage World Conference, TechTarget, the Fibre Channel Conference, SAN-West, SAN-East, SNIA Security Summit, Syscan 2004, and Bellua 2005. Himanshu currently has a patent pending on a storage design architecture that he co-developed with other @stake professionals. The patent is for a storage security design that can be implemented on enterprise storage products deployed in Fibre Channel storage networks. Additionally, Himanshu has published three books, including "The Complete Storage Reference" - Chapter 25 Security Considerations (McGraw-Hill/Osborne), "Implementing SSH" (Wiley Publishing), and "Securing Storage" (Addison Wesley Publishing), which is due out in the fall of 2005. Furthermore, Himanshu has also published two white papers. The first white paper Himanshu wrote is titled "Securing Intellectual Property", which provides insight and recommendations on how to protect an organization's network from the inside out. Additionally, Himanshu has written a second white paper titled Storage Security, which provides the basic best practices and recommendations in order to secure a SAN or a NAS storage network.
Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference
Himanshu Dwivedi's presentation will discuss the severe security issues that exist in the default implementations of iSCSI storage networks/products. The presentation will cover iSCSI storage as it pertains to the basic principals of security, including enumeration, authentication, authorization, and availability. The presentation will contain a short overview of iSCSI for security architects and basic security principals for storage administrators. The presentation will continue into a deep discussion of iSCSI attacks that are capable of compromising large volumes of data from iSCSI storage products/networks. The iSCSI attacks section will also show how simple attacks can make the storage network unavailable, creating a devastating problem for networks, servers, and applications. The presenter will also follow-up each discussion of iSCSI attacks with a demonstration of large data compromise. iSCSI attacks will show how a large volume of data can be compromised or simply made unavailable for long periods of time without a single root or administrator password. The presentation will concluded with existing solutions from responsible vendors that can protect iSCSI storage networks/products. Each iSCSI attack/defense described by the presenter will contain deep discussions and visual demonstrations, which will allow the audience to fully understand the security issues with iSCSI as well as the standard defenses. Himanshu Dwivedi is a founding partner of iSEC Partners, LLC. a strategic security organization. Himanshu has 11 years experience in security and information technology. Before forming iSEC, Himanshu was the Technical Director for @stake's bay area practice, the leading provider for digital security services. His professional experiences includes application programming, infrastructure security, secure product design, and is highlighted with deep research and testing on storage security for the past 5 years. Himanshu has focused his security experience towards storage security, specializing in SAN and NAS security. His research includes iSCSI and Fibre Channel (FC) Storage Area Networks as well as IP Network Attached Storage. Himanshu has given numerous presentations and workshops regarding the security in SAN and NAS networks, including conferences such as BlackHat 2004, BlackHat 2003, Storage Networking World, Storage World Conference, TechTarget, the Fibre Channel Conference, SAN-West, SAN-East, SNIA Security Summit, Syscan 2004, and Bellua 2005. Himanshu currently has a patent pending on a storage design architecture that he co-developed with other @stake professionals. The patent is for a storage security design that can be implemented on enterprise storage products deployed in Fibre Channel storage networks. Additionally, Himanshu has published three books, including "The Complete Storage Reference" - Chapter 25 Security Considerations (McGraw-Hill/Osborne), "Implementing SSH" (Wiley Publishing), and "Securing Storage" (Addison Wesley Publishing), which is due out in the fall of 2005. Furthermore, Himanshu has also published two white papers. The first white paper Himanshu wrote is titled "Securing Intellectual Property", which provides insight and recommendations on how to protect an organization's network from the inside out. Additionally, Himanshu has written a second white paper titled Storage Security, which provides the basic best practices and recommendations in order to secure a SAN or a NAS storage network.